Home | Amazing | Today | Tags | Publishers | Years | Search 
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)

 

Welcome to Packaging the Brand, a book that will introduce you to the design and creation of packaging as it forms part of the product branding process. This book aims to explore the many different ways by which brands come to be packaged and to consider
...
OpenStack Cloud Computing Cookbook
OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today. This book is specifically designed to quickly help you get up...
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)
Euroscepticism: Party Politics, National Identity and European Integration (European Studies 20)

The accelerated pace of European integration since the early 1990s has been accompanied by the emergence of increasingly prominent and multiform oppositions to the process. The term Euroscepticism has appeared with growing frequency in a range of political, media, and academic discourses. Yet, the label is applied to a wide range of...

Hands-On Ethical Hacking and Network Defense
Hands-On Ethical Hacking and Network Defense

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Transformation - A Fundamental Idea of Mathematics Education
Transformation - A Fundamental Idea of Mathematics Education

The diversity of research domains and theories in the field of mathematics education has been a permanent subject of discussions from the origins of the discipline up to the present. On the one hand the diversity is regarded as a resource for rich scientific development on the other hand it gives rise to the often repeated criticism of the...

Continuous Enterprise Development in Java
Continuous Enterprise Development in Java

Learn a use-case approach for developing Java enterprise applications in a continuously test-driven fashion. With this hands-on guide, authors and JBoss project leaders Andrew Lee Rubinger and Aslak Knutsen show you how to build high-level components, from persistent storage to the user interface, using the Arquillian testing...

Online Dating as A Strategic Game: Why and How Men in Hong Kong Use QQ to Chase Women in Mainland China
Online Dating as A Strategic Game: Why and How Men in Hong Kong Use QQ to Chase Women in Mainland China

Based on a study using online ethnography as the major research method, this book explains why and how men in Hong Kong use QQ—an online instant messenger—to “chase” women in mainland China, especially in the neighboring city of Shenzhen. Chasing women through QQ is a reciprocal exchange process during which the...

From Expert Student to Novice Professional (Professional Learning and Development in Schools and Higher Education)
From Expert Student to Novice Professional (Professional Learning and Development in Schools and Higher Education)

Students entering higher education expect their studies to lead them towards some specific form of professional career. But in this age, complex internationalized professions are the main source of work for graduates, so students need to prepare themselves for a future that can be volatile, changeable and challenging. This book shows how...

The Little Republic: Masculinity and Domestic Authority in Eighteenth-Century Britain
The Little Republic: Masculinity and Domestic Authority in Eighteenth-Century Britain

The relationship between men and the domestic in eighteenth-century Britain has been obscured by two well-established historiographical narratives. The first charts changes in domestic patriarchy, founded on political patriarchalism in the early modern period and transformed during the eighteenth century by new types of family relationship...

Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)
Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)

The sheer computing power of modern information technology is changing the face of research not just in science, technology and mathematics, but in humanities and cultural studies too. Recent decades have seen a major shift both in attitudes and deployment of computers, which are now vital and highly effective tools in disciplines where they...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy